Latest Updates

dual-7-layers-of-security

The “Dual-7-Layers-of-Security” approach secures the digital and trusted identity of end customers on seven different levels, throughout the entire process. The core of this approach is KOBIL’s mIDentity Application Security Technology (mAST) – an end-to-end security platform for application shielding, user authentication, transaction authorization and digital signatures, using trustworthy identities. This ensures secure, binding and reliable communication between companies, third parties and their customers. KOBIL’s proven Public Key Infrastructure (PKI) solution uses advanced mechanisms for shielding, protection, prevention, detection and reporting.

The “Dual-7-Layers-of-Security” approach secures the digital and trusted identity of end customers on seven different levels, throughout the entire process. The core of this approach is KOBIL’s mIDentity Application Security Technology (mAST) – an end-to-end security platform for application shielding, user authentication, transaction authorization and digital signatures, using trustworthy identities. This ensures secure, binding and reliable communication between companies, third parties and their customers. KOBIL’s proven Public Key Infrastructure (PKI) solution uses advanced mechanisms for shielding, protection, prevention, detection and reporting.

How We Support Your Business

The strength of Dual-7-Layers-of-Security results from a holistic approach consisting of 7 security levels. Up to now, companies have provided access protection without any protection of their applications nor device binding. Although, there are individual providers on the market for application shielding, user authentication, transaction authorization and digital signatures, but none of them provides a complete solution. In the future, companies have to create a solution consisting of different modules from different vendors. This includes high costs, administrative effort and a limited user experience. KOBIL’s end-to-end security platform is a seven-level strategy that accompanies the entire process with only one technology. It is delivered as a Software Development Kit (SDK) with the option of a whitelabel app, easy to integrate and instantly to use.

security reviews & analysis

coming soon

coming soon

Coming Soon

1 Secure Device

App Centric Management

After starting the application, the first step is to check the device on which the application or transaction is to be carried out. Various security checks are executed in the background by the SSMS server, for example if the app has been copied to another device or has been manipulated. All these checks run over our own Digitanium™ Channel, which is end-to-end encrypted. This connects the device with the KOBIL real-time Smart Security Management Server.

2 Secure App

Next Generation Application Shielding

Parallel to the first step, in the second step the application (mobile or web) is checked by the Smart Security Server (SMSS) in real-time. After the connection is made, the server scans the authenticity of the device and application using a multitude of “security sensors”, and checks whether the latest version is being used. The process continues only upon a successful outcome.

3 Virtual Smart Card

Seamless PKI Technology

Once the device, the app and the environment are considered secure, the SSMS server activates the KOBIL Virtual Smartcard in the SDK (in which the user identity is stored) trough the Digitanium™ Channel.
The application is then connected to the device. This means that there is a “separation of power” between the SDK and the SSMS server, since these work together to ensure security.

With the help of the user identity, it is possible to make “Dynamic Linking”, i.e. the digital signature of the transaction data for the activation of bank transfers.

4 Real-Time Smart Security Management Server

Anytime, Anyplace and Any Situation

The SSMS scans the status of the device, app and user through the Digitanium™ Channel, and also checks the authenticity of the communication. It also acts as a Certification Authority(Trust Center) to issue a digital certificate and individual PKI certificates for each user’s device and application instance. The SSMS can be easily distinguished and managed separately.

5 Digitanium™ Channel

Dual Secure Communication Channel

The Digitanium Channel™ works independently from the underlying operating system, using its own TLS stack and trust store to establish an end-to-end encrypted and authenticated communication channel, which is invisible to all other transactional participants.

Only in combination with the secure device, the secure application, the virtual smart card and the Smart Security Management Server you can secure the transport of sensitive data between the user and the company.

It blocks man-in-the-middle attacks and ensures data confidentiality and integrity. Passwords and confidential information are conveyed to the new user and general access to systems is enabled and monitored.

6 Trusted digital Identity

Secure and Reliable Identity

Only if the device and the application are identified as safe, the user is prompted to enter their personal PIN code. This is used to create the authentication code – a digital signature. It is a complete PKI infrastructure that verifies the identity of the end user and verifies the identity in an independent backend. After five failed attempts, the process is automatically aborted and can only be unlocked again by the SSMS server.

It doesn’t matter whether you login via PC or smartphone. All communication takes place via the secure server in the backend.

7 Trusted digital Signature

Sign with Digital Certificates

With the help of the user identity it is possible to make “Dynamic Linking”, which is the digital signature for the data transaction.

The digital signature is used for authorization. At KOBIL, this is based on digital certificates in order to complete all transactions securely and reliably. A proof of origin guarantees the company or the financial institution that it is a real user who accepts the interaction.

Multi-Purpose-Device Strategy

When a process relies on a multi-purpose device such as tablet, desktop or mobile phone, an additional security, trust and secure communication layer should be employed to minimize the risk that the device will be compromised. It is essential to ensure that the application or the device has not been changed.

KOBIL’s technology is developed for all platforms and applications. This provides end-to-end security, which detects, prevents and responds to the amendment of devices and mobile apps.

Subscribe for KOBIL

Learn more about digitanium with KOBIL!

Name:

Email:

I agree that KOBIL may use the information I provided in accordance with this privacy policy and may also provide additional marketing-related communications. KOBIL will use all information provided here solely in accordance with the privacy policy.

Download Whitepapers

I agree that KOBIL may use the information I provided in accordance with this privacy policy and may also provide additional marketing-related communications. KOBIL will use all information provided here solely in accordance with the privacy policy.

Get a Live Demo

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy